Showing 101-120 of 9648 plugins with known vulnerabilities

Search all WordPress Plugins with known vulnerabilities

1 Vulnerability
Apr 7, 2012
1 Vulnerability
Apr 16, 2012
2 Vulnerabilities
Apr 23, 2012
1 Vulnerability
Apr 24, 2012
2 Vulnerabilities
Apr 26, 2012
1 Vulnerability
Apr 30, 2012
2 Vulnerabilities
May 9, 2012
2 Vulnerabilities
May 11, 2012
1 Vulnerability
May 11, 2012
1 Vulnerability
May 14, 2012
1 Vulnerability
May 15, 2012
1 Vulnerability
May 15, 2012
1 Vulnerability
May 15, 2012
1 Vulnerability
May 15, 2012
4 Vulnerabilities
May 15, 2012
2 Vulnerabilities
May 15, 2012
1 Vulnerability
May 21, 2012
1 Vulnerability
May 26, 2012
1 Vulnerability
May 31, 2012
1 Vulnerability
Jun 5, 2012
Title Number of Vulnerabilities Last Vulnerability
Front-end Editor 1 April 7, 2012
Support Tickets Center 1 April 16, 2012
Organizer 2 April 23, 2012
ShareYourCart 1 April 24, 2012
zingiri-web-shop 2 April 26, 2012
WPsc MijnPress 1 April 30, 2012
User Photo 2 May 9, 2012
2 Click Social Media Buttons 2 May 11, 2012
Bad Behavior 1 May 11, 2012
Media File Manager Advanced 1 May 14, 2012
Network Publisher 1 May 15, 2012
PDF & Print Button Joliprint 1 May 15, 2012
Sabre 1 May 15, 2012
track-that-stat 1 May 15, 2012
WP Forum Server 4 May 15, 2012
WP Survey And Quiz Tool 2 May 15, 2012
Share and Follow 1 May 21, 2012
Asset Manager 1 May 26, 2012
Plugin: Newsletter 1 May 31, 2012
HTML5 AV Manager 1 June 5, 2012

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation